fbpx

Technology News

SOFTWARE TEST AUTOMATION

Software test automation is in demand now days. Companies are moving to test automation to meet the dead lines of the product delivery. On daily requirement changing it is difficult for a companies to meet deliver the program on time. Automation helps them to reduce...

MEASURING TESTER’S SUCCESS

How to measure tester’s success is really a big challenge. Can tester’s ability be measured by number of defects logged? Answer is No, there are many other impacted areas which have more influence to measure tester’s success. Type of Defect: One needs to check the type of...

HOW TO BECOME A GOOD TESTER?

Following are some of the good tactics to become a good tester.     Honesty: Honesty is the best policy as a being tester as well. Make sure that you are well informing developers about your plan to test application. Supportive: Developers many times seek helps from tester to fix issue...

EQUIVALENCE CLASS PARTITIONING

Equivalence class partitioning or EQP is the technique of blackbox software testing method. In this technique tester separates data in two distinct type Valid data Invalid data If we look at input testing number of input data would be more and if we test application with all possible...

BOUNDARY VALUE ANALYSIS

In a blackbox testing method boundary value analysis is the most effective software testing technique. In this method tester tries to test the application object with its range of input. For example if one wants to test the following application for following form with customer...

SOFTWARE TESTING BASICS: 1

Software Testing is not limited to Error Detection only, The goal of software testing to Find Errors, Find them as early as possible and make sure that they get fixed. For the effective software testing there are many methods, which can help tester to simplify...

WEB APPLICATION FAULT MODEL

Any web application has three main components. The Server: The computer where web contents resides The Client:  The computer where contents needs to be served. The Network: The interconnect link between two. Issues Verification for the Server: As a thumb rule all web application should have validation of application at client and...

SECURING WORDPRESS PART 2 (BY EDITING FILES)

In last blog post we discussed about hot to secure WordPress installation with some plugins. We need to do some modification in files to secure WordPress, in this blog post we will look at which files needs to be changed in order to make WordPress installation like real steel. Remove META...

SECURING WORDPRESS PART 1 (USING PLUGINS)

As per the status today there are more than 60,997,996 sites are using WordPress as their blogging / content management system and we are also one of them. In recent years number of WordPress users is increasing day by just because of its simplicity. When we use...